2019
DOI: 10.1109/tse.2019.2939528
|View full text |Cite
|
Sign up to set email alerts
|

POMP++: Facilitating Postmortem Program Diagnosis with Value-set Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…Experimental results show that out of 31 tested bugs, the causes of 29 bugs were accurately identified. Mu et al implemented POMP++ based on POMP [51]. Before conducting reverse analysis, POMP++ enhanced bias analysis by incorporating value-set analysis (VSA) and hypothesis verification, allowing for the recovery of more detailed data flow and increasing the efficiency of bug-cause identification.…”
Section: Methods Based On Context Comparisonmentioning
confidence: 99%
“…Experimental results show that out of 31 tested bugs, the causes of 29 bugs were accurately identified. Mu et al implemented POMP++ based on POMP [51]. Before conducting reverse analysis, POMP++ enhanced bias analysis by incorporating value-set analysis (VSA) and hypothesis verification, allowing for the recovery of more detailed data flow and increasing the efficiency of bug-cause identification.…”
Section: Methods Based On Context Comparisonmentioning
confidence: 99%
“…These include Domain Generation Algorithms (DGA) analysis [17], patterns recognition for command and control sequences [18], analysis of Domain Name Systems (DNS) patterns for hosting malware [19], among others. However, memory dumping analysis stands out as the most promising [8] due to it enables the examination of postmortem scenarios, offering insights into the malware's primary features and behaviors after it has completed its entire attack sequence [3], [11].…”
Section: A Motivationmentioning
confidence: 99%
“…For instance, the number of handlers opened by the operative system on request of the process, the number of opened sockets for communication to remote sites; and the number of mutex and semaphores used are attributes that can help to detect obfuscated privacy malware categories and even its family sub-classification. The contributions presented by Lashkari et al [10] and Mu et al [11] detail a complete guide for this procedure.…”
Section: Introductionmentioning
confidence: 99%
“…Xu et al [58] proposed to improve root cause analysis when a core dump contains corrupted data (e.g., due to memory corruption vulnerabilities). Xu et al [59] later proposed an approach (and extensions [36]) that uses the Intel processor trace feature and a core dump to perform offline binary analysis to recover instructions that lead to a crash. Subsequently, Cui et al [11] suggested a refinement wherein the accuracy of the recovered data flow is improved.…”
Section: Related Workmentioning
confidence: 99%